Quaternary privacy-levels preservation in computer forensics investigation process
暂无分享,去创建一个
[1] Philip Turner,et al. Selective and intelligent imaging using digital evidence bags , 2006, Digit. Investig..
[2] Robert Slade. Software Forensics : Collecting Evidence from the Scene of a Digital Crime , 2004 .
[3] Gregg H. Gunsch,et al. An Examination of Digital Forensic Models , 2002, Int. J. Digit. EVid..
[4] Eugene H. Spafford,et al. An Event-Based Digital Forensic Investigation Framework , 2004 .
[5] Philip Turner,et al. Applying a forensic approach to incident response, network investigation and system administration using Digital Evidence Bags , 2007, Digit. Investig..
[6] James P. Titus,et al. Security and Privacy , 1967, 2022 IEEE Future Networks World Forum (FNWF).
[7] Eugene H. Spafford. Some Challenges in Digital Forensics , 2006, IFIP Int. Conf. Digital Forensics.
[8] Nicole Beebe,et al. Digital forensic text string searching: Improving information retrieval effectiveness by thematically clustering search results , 2007, Digit. Investig..
[9] Peter Stephenson. A comprehensive approach to digital incident investigation , 2003, Inf. Secur. Tech. Rep..
[10] Paul Sanderson. Mass image classification , 2006, Digit. Investig..
[11] Ahmad Almulhem. Network forensics: Notions and challenges , 2009, 2009 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT).
[12] S. Srinivasan. Security and Privacy in the Computer Forensics Context , 2006, 2006 International Conference on Communication Technology.
[13] Charles W. Adams. Legal Issues Pertaining to the Development of Digital Forensic Tools , 2008, 2008 Third International Workshop on Systematic Approaches to Digital Forensic Engineering.
[14] Nicole Beebe,et al. A hierarchical, objectives-based framework for the digital investigations process , 2005, Digit. Investig..
[15] Philip Turner,et al. Digital provenance - interpretation, verification and corroboration , 2005, Digit. Investig..
[16] Philip Turner,et al. Unification of Digital Evidence from Disparate Sources (Digital Evidence Bags) , 2005, DFRWS.
[17] A Min Tjoa,et al. Towards More Trustable Log Files for Digital Forensics by Means of “Trusted Computing” , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.
[18] Peter Stephenson. The Forensic Investigation Steps , 2002 .
[19] Carsten Rudolph,et al. Security Digital Evidence , 2010, 2010 Fifth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering.
[20] Yvo Desmedt,et al. Security or Privacy , Must We Choose ? , 2001 .
[21] Claudia Eckert,et al. Securing Digital Evidence , 2009 .
[22] Nicole Beebe,et al. Dealing with Terabyte Data Sets in Digital Investigations , 2005 .
[23] Erin E. Kenneally,et al. Risk sensitive digital evidence collection , 2005, Digit. Investig..
[24] M. B. Mukasey,et al. Electronic Crime Scene Investigation: A Guide for First Responders, Second Edition , 2008 .
[25] Eugene H. Spafford,et al. Getting Physical with the Digital Investigation Process , 2003, Int. J. Digit. EVid..
[26] G. Richard,et al. Breaking the Performance Wall: The Case for Distributed Digital Forensics , 2004 .
[27] Nicole Beebe,et al. Digital Forensic Research: The Good, the Bad and the Unaddressed , 2009, IFIP Int. Conf. Digital Forensics.